SSCP | Systems Security Certified Practitioner

COURSE OVERVIEW

The best entry level IT security certification

The SSCP certification from (ISC)² is ideal for security practitioners who want to elevate their level of expertise in system security.

On-Demand, Bootcamp or Virtual Classroom options

Access online course content, videos, exercises, discussions and chats

Pre and post course assessments

Virtual labs for hands-on experience

Live lab add-ons available

Develop real-life skills you can apply in the workplace with Live Labs

Access to over 25,000 e-books and 30,000 downloadable video tutorials

Expert mentoring and coaching to answer questions and guide your learning

Course completion certificates

Cybersecurity Career Guide

*
*
*
*
*

1

GREAT OPPORTUNITY

Certifications like the SSCP provide lucrative opportunities for security specialists who are willing to train on a new skill.

2

LEARN IN-DEMAND SKILLS

The demand for IT security experts with certifications like the SSCP continues to grow as the increasing number of cybersecurity attacks continues to rise.

3

GLOBALLY RECOGNIZED

Earn an systems security certification from the world renowned leader in cybersecurity.

Course guide

Qualification: SSCP

Study time: Full time – five to six days | Part time – six weeks

Vendor: (ISC)²

Student support: Success Advisors

Prerequisites: One year+ experience in information security + subscription to (ISC)² Code of Ethics recommended

Assessment: Exam based – SSCP

Resources: Internet access and email

Ideal for: Senior network security engineers, senior security systems analysts or senior security administrators

Modules

SSCP introduction

  • Information security
  • SSCP
  • CBK
  • Security concerns

Access control

  • Identification, authentication, authorisation and accounting
  • Access control techniques
  • Best practices for access control
  • Access control administration
  • Access control models, methodologies and implementation Physical security
  • Attacks
  • Monitoring and intrusion detection
  • Penetration testing

Administration

  • The C.I.A. triad policy, standards, guidelines and baselines
  • Privacy issues and regulation
  • Data classification
  • Security architecture and design
  • Controls, evaluation criteria and security models
  • Development lifecycle
  • Configuration management
  • Hardware components
  • Employment practices
  • Security threats and attacks

Audit and monitoring

  • Types of controls
  • Incident response and analysis
  • Monitoring devices and techniques

Cryptography

  • Cryptographic terms and technologies
  • Message authentication
  • Certificate authority

Data communications

  • Security overview
  • Internet, intranet and extranet security
  • TCP/IP LANs, WANs and VPNs
  • Network layer security protocols
  • Transport layer security
  • Application layer security protocols

Malicious code and malware

  • Malicious code types
  • Mobile code threats
  • Types of attacks

Risk response and recovery

  • Risk management
  • Knowledge based systems
  • Safeguards and countermeasures
  • Incident handling
  • Forensics Business continuity project planning

Get certified the KnowledgeNet way

Professional development that works around you

  • World’s #1 eLearning portal
  • 12 months unlimited access
  • Expert mentors
  • Test prep
  • Global community of peers
  • Award winning training used globally by leading corporate clients

AVERAGE SALARY

2013
2014
2015
2016
2017
JAN
JUL
JAN
JUL
JAN
JUL
JAN
JUL
JAN